11 research outputs found

    Detecting frauds in online advertising systems

    No full text
    Online advertising is aimed to promote and sell products and services of various companies in the global market through internet. In 2005, it was estimated that companies spent $10B in web advertisements, and it is expected to grow by 25-30% in the next few years. The advertisements can be displayed in the search results as sponsored links, on the web sites, etc. Further, these advertisements are personalized based on demographic targeting or on information gained directly from the user. In a standard setting, an advertiser provides the publisher with its advertisements and they agree on some commission for each customer action. This agreement is done in the presence of Internet Advertising commissioners, who represent the middle person between Internet Publishers and Internet Advertisers. The publisher, motivated by the commission paid by the advertisers, displays the advertisers’ links in its search results. Since each player in this scenario can earn huge revenue through this procedure, there is incentive to falsely manipulate the procedure by extracting forbidden information of the customer action. By passing this forbidden information to the other party, one can generate extra revenue. This paper discusses an algorithm for detecting such frauds in web advertising networks

    Structured Message Management for Group Interaction

    No full text

    A Taxonomy of Privacy and Security Risks Contributing Factors

    No full text
    Part 2: Privacy MetricsInternational audienceIdentity management system(s) (IDMS) do rely on tokens in order to function. Tokens can contribute to privacy or security risk in IDMS. Specifically, the characteristics of tokens contribute greatly to security and privacy risks in IDMS. Our understanding of how the characteristics of token contribute to privacy and security risks will help us manage the privacy and security risks in IDMS. In this article, we introduce a taxonomy of privacy and security risks contributing factors to improve our understanding of how tokens affect privacy and security in IDMS. The taxonomy is based on a survey of IDMS articles. We observed that our taxonomy can form the basis for a risk assessment model

    Subtyping Influenza A Virus with Monoclonal Antibodies and an Indirect Immunofluorescence Assay

    Get PDF
    Abstract. Any finite tree automaton (or regular type) can be used to construct an abstract interpretation of a logic program, by first determinising and completing the automaton to get a pre-interpretation of the language of the program. This has been shown to be a flexible and practical approach to building a variety of analyses, both generic (such as mode analysis) and program-specific (with respect to a type describing some particular property of interest). Previous work demonstrated the approach using pre-interpretations over small domains. In this paper we present techniques that allow the method to be applied to more complex pre-interpretations and larger programs. There are two main techniques presented: the first is a novel algorithm for determinising finite tree automata, yielding a compact “product” form of the transitions of the result automaton, that is often orders of magnitude smaller than an explicit representation of the automaton. Secondly, it is shown how this form (which is a representation of a pre-interpretation) can then be input directly to a BDD-based analyser of Datalog programs. We demonstrate through experiments that much more complex analyses become feasible.

    Using Datalog with binary decision diagrams for program analysis

    No full text
    Many problems in program analysis can be expressed naturally and concisely in a declarative language like Datalog. This makes it easy to specify new analyses or extend or compose existing analyses. However, previous implementations of declarative languages perform poorly compared with traditional implementations. This paper describes bddbddb, a BDD-Based Deductive DataBase, which implements the declarative language Datalog with stratified negation, totally-ordered finite domains and comparison operators. bddbddb uses binary decision diagrams (BDDs) to efficiently represent large relations. BDD operations take time proportional to the size of the data structure, not the number of tuples in a relation, which leads to fast execution times. bddbddb is an effective tool for implementing a large class of program analyses. We show that a context-insensitive points-to analysis implemented with bddbddb is about twice as fast as a carefully hand-tuned version. The use of BDDs also allows us to solve heretofore unsolved problems, like context-sensitive pointer analysis for large programs
    corecore